63 research outputs found

    Advances in Information Security and Privacy

    Get PDF
    With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue

    The InfoSec Handbook

    Get PDF
    Computer scienc

    The InfoSec Handbook

    Get PDF
    Computer scienc

    Exploring New Paradigms for Mobile Edge Computing

    Get PDF
    Edge computing has been rapidly growing in recent years to meet the surging demands from mobile apps and Internet of Things (IoT). Similar to the Cloud, edge computing provides computation, storage, data, and application services to the end-users. However, edge computing is usually deployed at the edge of the network, which can provide low-latency and high-bandwidth services for end devices. So far, edge computing is still not widely adopted. One significant challenge is that the edge computing environment is usually heterogeneous, involving various operating systems and platforms, which complicates app development and maintenance. in this dissertation, we explore to combine edge computing with virtualization techniques to provide a homogeneous environment, where edge nodes and end devices run exactly the same operating system. We develop three systems based on the homogeneous edge computing environment to improve the security and usability of end-device applications. First, we introduce vTrust, a new mobile Trusted Execution Environment (TEE), which offloads the general execution and storage of a mobile app to a nearby edge node and secures the I/O between the edge node and the mobile device with the aid of a trusted hypervisor on the mobile device. Specifically, vTrust establishes an encrypted I/O channel between the local hypervisor and the edge node, such that any sensitive data flowing through the hosted mobile OS is encrypted. Second, we present MobiPlay, a record-and-replay tool for mobile app testing. By collaborating a mobile phone with an edge node, MobiPlay can effectively record and replay all types of input data on the mobile phone without modifying the mobile operating system. to do so, MobiPlay runs the to-be-tested application on the edge node under exactly the same environment as the mobile device and allows the tester to operate the application on a mobile device. Last, we propose vRent, a new mechanism to leverage smartphone resources as edge node based on Xen virtualization and MiniOS. vRent aims to mitigate the shortage of available edge nodes. vRent enforces isolation and security by making the users\u27 android OSes as Guest OSes and rents the resources to a third-party in the form of MiniOSes

    UOW Research Report 1989- 1990

    Get PDF

    WORLD WAR III A TECHNO ECONOMIC INTROSPECTION

    Get PDF
    Starting from February 2007 world market is facing what we call enantiodromia. The indices are correcting. It is not known whether this is the final correction but there is no doubt that the bubble has burst and air out of it is gushing out slowly (fast on an extended time frame). The biggest question faced by the world now is whether the bursting of the bubble will bring in a deflationary environment as seeds of deflation are seen already germinating very much within the core of rampant inflation envisaged everywhere. ‘Ke sera sera’ whatever will be, will be, but is it not important to investigate as to how this economic menace could happen unnoticed by all? Was there any game plan conceived by a few nations to make best use of the last bit of the Grand Supercycle that began around 1789? Is it not important to rescan flaws remaining within the very system of capital flow/accumulation and control? The science of war, too, has undergone a sea of change. It is no more a concept of battle of arms restricted to a specific war field. With the advent of globalization the boundaries between countries have diluted. The new warfare recognizes no geographical boundaries. It is clash of finance versus finance with ultimate objective remaining the same: worldwide destruction and impoverishment of the rest of the world. Terrorist activities too come within the ambit of this new framework of warfare that is nothing but deployment of combinations. This is return of World War again. Whether we accept or not, truth remains, World War III is going on, possibly since the year 1982. Having notices the cancer growing underneath the beautiful skin of economic boom one and a half year back, we walked up to several publishers and a renowned university in India to help us send across the message to the millions across the world. Context of the book trashing the economic situation then, made all skeptical to go ahead and publish the same. This prompted me to put this book up in the air as an e-book in an effort to bring this into the eye of the millions that surf the net everyday. Which too did not fair well, and before I could do anything to bring this subject to the eyes of the common man, the debacle occurred. Had it been published at the right time, thousands, if not millions that lost heavily in the economic crash, may have had a way to save something in the landslide. However, as the book sites, there is a lot remaining to happen. Furthermore, the same can be used to avoid similar instances in future
    • …
    corecore